Fault Tolerance
Ecommerce
Backup
Disaster Recovery
You are Decrypted
100

A major part of a contingency plan is to provide _____

redundancy

100

Using this type of card will include better protection against online fraud

credit card

100

This type of backup allows data to be restored quickly when a file has been lost.

Local Backup

100

A good disaster recovery plan needs to be _________ by the other components of the business continuity plan.

informed

100

Using a Caesar Cipher shift 3 decrypt the following :

khoor zruog

hello world

200

an area used to store and share such things as computer systems, applications, data, and components such as switches and routers.

Data center

200

Using this connection ensures that your financial data will be encrypted and less likely to be stolen by a hacker.

HTTPS

200

These backups are particularly important before installing new applications or making significant configuration changes.

System Backups

200

By understanding the most critical business functions IT administrators can do this to know what systems need to be restored first after a disaster.

Prioritization

200

Using a Caesar Cipher shift 7 decrypt the following :

aol mve qbtwz vcly aol mlujl

the fox jumps over the fence

300

With this strategy, all data is stored on two or more disks simultaneously.

RAID Redundant Array of Independent Disks

300

Never conduct ecommerce transactions using _______

public WiFi

300

This type of backup uses Transaction log backups

Database backups

300

Data restoration plans need to verify that the data have not been ______________________

corrupted

300

Using a Caesar Cipher shift 4 decrypt the following :

aew mx e gex m wea

was it a cat I saw

400

Installing multiple network interface cards into the server is a way to to provide ________________

Network Redundancy

400

When conducting transactions online we need to adopt safeguards to protect ourselves against __________

 identity theft

400

These devices contain one or more hard drives that users can access over the network and can be used for file sharing, backups, and even streaming media.

Network Attached Storage (NAS)

400

Intangible impacts estimated when planning for disasters

loss of customer trust


400

Using a Caesar Cipher shift 9 decrypt the following :

bqn bnuub bnj bqnuub kh cqn bnj bqxan

she sells sea shells by the sea shore

500

This is a large battery that's connected both to the computer and the wall outlet.

UPS

500

When conducting ecommerce transactions it'll be a good practice to examine URLs closely to make sure they don't include __________________________

misspellings of legitimate sites.

500

This provides a convenient, flexible, and scalable alternative to traditional backup methods, and in some cases can fulfill the requirement for offsite backups.

Cloud Storage

500

To make sure the plan will be successful, it's important to conduct __________________.

disaster recovery exercises

500

Using a Caesar Cipher shift 5 decrypt the following :

xtrj rjs nsyjwuwjy snsj rjrtx

Some men interpret nine memos